SlideShare a Scribd company logo
ETHICAL HACKING
Name :-Sweta Leena Panda
General Hacking Methods
 A typical attacker works in the following manner:
1. Identify the target system.
2. Gathering Information on the target system.
3. Finding a possible loophole in the target system.
4. Exploiting this loophole using exploit code.
5. Removing all traces from the log files and escaping without a
trace.
The External Hacker
Desktop PC
Client's business partnerMy Client
Bridge Bridge
Dial-infromhome
Dial-up
ISDN
connection
Internet
Firewall
Leased
line
Web Developer
Desktop PC
Client's business partnerMy Client
Bridge Bridge
Dial-infromhome
Dial-up ISDN
connection
Internet
Firewall
Leased
line
Web Developer
Secure
the
desktop Secure
Internet
connecti
ons
Secure
third-party
connections
Secure
the
network
The Inside Hacker
 Foot Printing
 Scanning
 Gaining Access
 Maintaining Access
Start With Foot Printing
 NS Lookup
 IP Lookup
 Whois LookUp
 IP Address and Port as start point for assessment- MYTH
 Finding web application running on domain.
 HOW????
IP Addresses
 Every system connected to a network has a unique Internet Protocol (IP)
Address which acts as its identity on that network.
 An IP Address is a 32-bit address which is divided into four fields of 8-bits
each. For Example, 203.94.35.12
 . A remote IP Address can easily be found out by any of the following
methods:
Through Instant Messaging Software
Through Internet Relay Chat
Through Your website
Through Email Headers
Finding an IP Address via Instant Messengers
 Case: If you are chatting on messengers like MSN, YAHOO etc. then
the following indirect connection exists between your system and your
friend’s system:
Your System------Chat Server---- Friend’s System
Friend’s System---------Chat Server------- Your System
Thus in this case, you first have to establish a direct connection with
your friend’s computer by either sending him a file or by using the call
feature.
Then, goto MSDOS or the command line and type:
C:>netstat -n
This command will give you the IP Address of your friend’s computer.
Finding an IP Address via Instant Messengers
Countermeasures
Do not accept File transfers or calls from unknown people
Chat online only after logging on through a Proxy Server.
A Proxy Server acts as a buffer between you and the un-trusted network
known as the Internet, hence protecting your identity.
Case: Your System-----Proxy------Chat Server------Friend’s System
Some good Proxy Servers are:
Wingate (For Windows Platform)
Squid (For Unix Platforms)
Finding an IP Address via Email Headers
 Hotmail.com along with numerous other Email Service Providers, add
the IP Address of the sender to each outgoing email.
 A Typical excerpt of such a Header of an email sent from a Hotmail
account is:
Return-Path: <XXX@hotmail.com>
Received: from hotmail.com by sbcglobal.net
(8.9.1/1.1.20.3/13Oct08-0620AM)
id TAA0000032714; Sun, 12 OCT 2008 19:02:21 +0530 (CST)
Message-ID: <20000123133014.34531.qmail@hotmail.com>
Received: from 202.54.109.174 by www.hotmail.com with HTTP; Sun,
Sun, 12 OCT 2008 05:30:14 PST
X-Originating-IP: [202.xx.109.174]
Dangers & Concerns
 DOS Attacks
 Disconnect from the Internet
 Trojans Exploitation
 Geographical Information
 File Sharing Exploits
Scanning
 Port scanning
 Network Scanning
 Finger Printing
Port Scanning: An Introduction
Port Scanning means to scan the target system in order to get a list of
open ports (i.e. ports listening for connections) and services running on
these open ports.
Port Scanning is normally the first step that an attacker undertakes.
Is used to get a list of open ports, services and the Operating System
running on the target system.
Manual Port Scanning can be performed using the famous ‘Telnet’
program.
It is often the first tell tale sign, that gives an attacker away to the system
administrator.
Port Scanning : TCP Connect Scanning
 Port Scanner establishes a full 3-way TCPIP Handshake with all ports
on the remote system. The regular 3-way TCPIP Handshake has been
depicted below:
1. Client---------SYN Packet------------- Host
2. Host-----------SYNACK Packet-------- Client
3. Client----------ACK Packet--------------- Host
 Accurate and Fastest Port Scanning Method.
Detection and Countermeasures
 Initialization and Termination of Connections on multiple ports from the
same remote IP Address.
 Only monitoring can be done. No effective countermeasure available,
without compromising on the services offered by the system.
Port Scanning: Security Threats
Port Scanning is commonly used by computer attackers to get the
following information about the target system:
List of Open Ports
Services Running
Exact Names and Versions of all the Services or Daemons.
Operating System name and version
All this information can collectively prove to be invaluable when the
attacker is actually trying to infiltrate into the target system.
Some of the best and the most commonly used Port Scanners are:
 Nmap
 Superscan
 Hping
ICMP Scanning: An Introduction
 The Internet Control Message Protocol (ICMP) is the protocol used for
reporting errors that might have occurred while transferring data
packets over networks
 Extremely Useful in Information Gathering.
 Originally, designed for network diagnosis and to find out as to what
went wrong in the data communication.
 Can be used to find out the following:
 Host Detection
 Operating System Information
 Network Topography Information
 Firewall Detection
ICMP Scanning: Host Detection---Ping Example
 Below is sample output of a PING command executed on a Windows
machine:
C:WINDOWS>ping www.yahoo.com
Pinging www.yahoo-ht3.akadns.net [69.147.96.15] with
32 bytes of data:
Reply from 69.147.96.15 : bytes=32 time=163ms TTL=61
Reply from 69.147.96.15 : bytes=32 time=185ms TTL=61
Reply from 69.147.96.15 : bytes=32 time=153ms TTL=61
Reply from 69.147.96.15 : bytes=32 time=129ms TTL=61
……………
DOS Attacks: Ping of Death Attack
The maximum packet size allowed to be transmitted by TCPIP on a
network is 65 536 bytes.
In the Ping of Death Attack, a packet having a size greater than this
maximum size allowed by TCPIP, is sent to the target system.
As soon as the target system receives a packet exceeding the allowable
size, then it crashes, reboots or hangs.
This attack can easily be executed by the ‘ping’ command as follows:
ping -l 65540 hostname
Gaining Access
 Password attack
 Social engineering
• Social Engineering. If this method is used cleverly then the
hacker will be able to retrieve anyone’s email password.
Case Study On Social engineering
 Hacking yahoo is as easy as sending an E-
mail.
 Have you ever asked for your password from
Yahoo? This system confuses that same
system.
 By simply emailing
retrieve_pwd_yh@yahoo.co.uk this
 var return[snd_mail] = your
email@yahoo.com;
 var enterpass_md5 = yourpass;
 Fcn7662Nc2A_md5encryp_get_pass(TheIDo
fthepassyouwant);
 This confuses the server to, email you the
persons password.
 All that is required is that you copy that script
exactly!
 Here is an example:
 window.open(“http://www.eliteskills.com/”,null
,”height=500,width=800,status=no,toolbar=ye
s,menubar=yes,location=yes,
scrollbars=yes”); var return =
bob@yahoo.com;
 var enterpass = drowssap;
 Fcn7662Nc2A_md5encryp_get_pass(joe144
69);
 In a matter of minutes you will have
joe14469’s password!
Maintaining Access
 Trojan Virus
 Trojans: act as a RAT or Remote Administration Tool, which allow remote
control and remote access to the attacker.
 Port Scan your own system regularly.
 If you find a irregular port open, on which you usually do not have a
service running, then your system might have a Trojan installed.
 One can remove a Trojan using any normal Anti-Virus Software.
e-m
ail
Laptop
Internet
Trojan software
now silently
installed
… trojan sees what they see
Corporate Network
Laptop
Firewall
Internet
Finance Server HR Server
Information flows out of the
organisation
Corporate Network
Laptop
Firewall
Internet
Finance Server HR Server
Evil server
Web Application are Three-tier
Application
Three-tier application
Overview of Internet Security
Web Application Security
Consortium (WASC) Statistics
Vulnerability
Hacking
THANK YOU

More Related Content

PPT
Hack the hack
PPT
Module 8 System Hacking
PPT
PDF
Introduction to foot printing
PPTX
System hacking
 
PPT
Module 2 Foot Printing
Hack the hack
Module 8 System Hacking
Introduction to foot printing
System hacking
 
Module 2 Foot Printing

What's hot (20)

PPT
Hacking tutorial
PPT
Hacking 1224807880385377-9
PPT
Module 4 Enumeration
PPTX
La seguridad sí importa: Windows Live & IE9
PDF
Footprinting
PDF
CEHv7 Question Collection
PPTX
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
PDF
CMIT 321 QUIZ 1
PPTX
Final Engagement
PPT
Reconnaissance & Scanning
PPTX
Session hijacking
PDF
Ccna 2 Chapter 8 V4.1 Answers
PPT
Honeypots - Tracking the Blackhat Community
PDF
CMIT 321 WEEK 2 QUIZ.
PPT
Operating System Fingerprinting Prevention
PDF
3.7.10 Lab Use Wireshark to View Network Traffic
PPTX
Attacks and their mitigations
PPTX
Hacking
PPT
Ip Spoofing
PPTX
Internet security
Hacking tutorial
Hacking 1224807880385377-9
Module 4 Enumeration
La seguridad sí importa: Windows Live & IE9
Footprinting
CEHv7 Question Collection
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
CMIT 321 QUIZ 1
Final Engagement
Reconnaissance & Scanning
Session hijacking
Ccna 2 Chapter 8 V4.1 Answers
Honeypots - Tracking the Blackhat Community
CMIT 321 WEEK 2 QUIZ.
Operating System Fingerprinting Prevention
3.7.10 Lab Use Wireshark to View Network Traffic
Attacks and their mitigations
Hacking
Ip Spoofing
Internet security

Similar to Hacking (20)

PPTX
Hacking by Pratyush Gupta
PPT
Ethical hacking is a based on computer hacking
PPT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
PPTX
Introduction to the Ethical hacking.pptx
PPT
31.ppt
PPT
presentation of professionalism harwares.ppt
PPT
Hacking Presentation
PPTX
hacking
PPTX
Offensive Security basics part 2
PPT
Introduction To Information Security
PPTX
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
PPTX
Workshop on Cyber security and investigation
PPT
Hacking and its Defence
PPT
Meletis Belsis - Introduction to information security
PPTX
lecture5.pptx
PDF
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
PPTX
Introduction To Ethical Hacking
PPTX
Ethical hacking
PPT
Network security
PDF
What is ethical hacking and complete cyber security presentation on this file
Hacking by Pratyush Gupta
Ethical hacking is a based on computer hacking
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
Introduction to the Ethical hacking.pptx
31.ppt
presentation of professionalism harwares.ppt
Hacking Presentation
hacking
Offensive Security basics part 2
Introduction To Information Security
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Workshop on Cyber security and investigation
Hacking and its Defence
Meletis Belsis - Introduction to information security
lecture5.pptx
COUNTERMEASURE TOOL - CARAPACE FOR NETWORK SECURITY
Introduction To Ethical Hacking
Ethical hacking
Network security
What is ethical hacking and complete cyber security presentation on this file

More from Sweta Leena Panda (20)

PDF
ModaMix - Virtual wardrobe management
PPTX
Product Teardown_How can Swiggy build its footprint and help highway travelle...
PDF
Comparative study of News world Odisha with other news channels like regional...
PDF
Comparative study of News world Odisha with other news channels like regional...
PPTX
Comparative study of News world Odisha with other news channels like regional...
PPTX
BRAND CRISIS
PPTX
SERVICE MARKETING IN HEALTHCARE SECTOR
PPTX
TALENT MANAGEMENT
PPTX
BUSINESS ETHICS
PDF
MARKETING BUDGET ALLOCATION
PPTX
DrData Project
PDF
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
PPTX
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
PDF
BRAND ISNOT JUST A NAME
PPTX
SUBLIMINAL ADVERTIZING
PPTX
CONSUMER BEHAVIOUR
PPTX
CRAFT BUSINESS
PPTX
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
PPTX
INDIAN ENGINEERING SECTOR
ModaMix - Virtual wardrobe management
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
BRAND CRISIS
SERVICE MARKETING IN HEALTHCARE SECTOR
TALENT MANAGEMENT
BUSINESS ETHICS
MARKETING BUDGET ALLOCATION
DrData Project
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
BRAND ISNOT JUST A NAME
SUBLIMINAL ADVERTIZING
CONSUMER BEHAVIOUR
CRAFT BUSINESS
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
INDIAN ENGINEERING SECTOR

Recently uploaded (20)

PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Machine Learning_overview_presentation.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
Teaching material agriculture food technology
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Getting Started with Data Integration: FME Form 101
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Unlocking AI with Model Context Protocol (MCP)
Encapsulation_ Review paper, used for researhc scholars
Reach Out and Touch Someone: Haptics and Empathic Computing
Group 1 Presentation -Planning and Decision Making .pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Programs and apps: productivity, graphics, security and other tools
cloud_computing_Infrastucture_as_cloud_p
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine Learning_overview_presentation.pptx
A Presentation on Artificial Intelligence
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Teaching material agriculture food technology
NewMind AI Weekly Chronicles - August'25-Week II
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Getting Started with Data Integration: FME Form 101
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Unlocking AI with Model Context Protocol (MCP)

Hacking

  • 2. General Hacking Methods  A typical attacker works in the following manner: 1. Identify the target system. 2. Gathering Information on the target system. 3. Finding a possible loophole in the target system. 4. Exploiting this loophole using exploit code. 5. Removing all traces from the log files and escaping without a trace.
  • 3. The External Hacker Desktop PC Client's business partnerMy Client Bridge Bridge Dial-infromhome Dial-up ISDN connection Internet Firewall Leased line Web Developer
  • 4. Desktop PC Client's business partnerMy Client Bridge Bridge Dial-infromhome Dial-up ISDN connection Internet Firewall Leased line Web Developer Secure the desktop Secure Internet connecti ons Secure third-party connections Secure the network
  • 5. The Inside Hacker  Foot Printing  Scanning  Gaining Access  Maintaining Access
  • 6. Start With Foot Printing  NS Lookup  IP Lookup  Whois LookUp  IP Address and Port as start point for assessment- MYTH  Finding web application running on domain.  HOW????
  • 7. IP Addresses  Every system connected to a network has a unique Internet Protocol (IP) Address which acts as its identity on that network.  An IP Address is a 32-bit address which is divided into four fields of 8-bits each. For Example, 203.94.35.12  . A remote IP Address can easily be found out by any of the following methods: Through Instant Messaging Software Through Internet Relay Chat Through Your website Through Email Headers
  • 8. Finding an IP Address via Instant Messengers  Case: If you are chatting on messengers like MSN, YAHOO etc. then the following indirect connection exists between your system and your friend’s system: Your System------Chat Server---- Friend’s System Friend’s System---------Chat Server------- Your System Thus in this case, you first have to establish a direct connection with your friend’s computer by either sending him a file or by using the call feature. Then, goto MSDOS or the command line and type: C:>netstat -n This command will give you the IP Address of your friend’s computer.
  • 9. Finding an IP Address via Instant Messengers Countermeasures Do not accept File transfers or calls from unknown people Chat online only after logging on through a Proxy Server. A Proxy Server acts as a buffer between you and the un-trusted network known as the Internet, hence protecting your identity. Case: Your System-----Proxy------Chat Server------Friend’s System Some good Proxy Servers are: Wingate (For Windows Platform) Squid (For Unix Platforms)
  • 10. Finding an IP Address via Email Headers  Hotmail.com along with numerous other Email Service Providers, add the IP Address of the sender to each outgoing email.  A Typical excerpt of such a Header of an email sent from a Hotmail account is: Return-Path: <[email protected]> Received: from hotmail.com by sbcglobal.net (8.9.1/1.1.20.3/13Oct08-0620AM) id TAA0000032714; Sun, 12 OCT 2008 19:02:21 +0530 (CST) Message-ID: <[email protected]> Received: from 202.54.109.174 by www.hotmail.com with HTTP; Sun, Sun, 12 OCT 2008 05:30:14 PST X-Originating-IP: [202.xx.109.174] Dangers & Concerns  DOS Attacks  Disconnect from the Internet  Trojans Exploitation  Geographical Information  File Sharing Exploits
  • 11. Scanning  Port scanning  Network Scanning  Finger Printing
  • 12. Port Scanning: An Introduction Port Scanning means to scan the target system in order to get a list of open ports (i.e. ports listening for connections) and services running on these open ports. Port Scanning is normally the first step that an attacker undertakes. Is used to get a list of open ports, services and the Operating System running on the target system. Manual Port Scanning can be performed using the famous ‘Telnet’ program. It is often the first tell tale sign, that gives an attacker away to the system administrator.
  • 13. Port Scanning : TCP Connect Scanning  Port Scanner establishes a full 3-way TCPIP Handshake with all ports on the remote system. The regular 3-way TCPIP Handshake has been depicted below: 1. Client---------SYN Packet------------- Host 2. Host-----------SYNACK Packet-------- Client 3. Client----------ACK Packet--------------- Host  Accurate and Fastest Port Scanning Method. Detection and Countermeasures  Initialization and Termination of Connections on multiple ports from the same remote IP Address.  Only monitoring can be done. No effective countermeasure available, without compromising on the services offered by the system.
  • 14. Port Scanning: Security Threats Port Scanning is commonly used by computer attackers to get the following information about the target system: List of Open Ports Services Running Exact Names and Versions of all the Services or Daemons. Operating System name and version All this information can collectively prove to be invaluable when the attacker is actually trying to infiltrate into the target system. Some of the best and the most commonly used Port Scanners are:  Nmap  Superscan  Hping
  • 15. ICMP Scanning: An Introduction  The Internet Control Message Protocol (ICMP) is the protocol used for reporting errors that might have occurred while transferring data packets over networks  Extremely Useful in Information Gathering.  Originally, designed for network diagnosis and to find out as to what went wrong in the data communication.  Can be used to find out the following:  Host Detection  Operating System Information  Network Topography Information  Firewall Detection
  • 16. ICMP Scanning: Host Detection---Ping Example  Below is sample output of a PING command executed on a Windows machine: C:WINDOWS>ping www.yahoo.com Pinging www.yahoo-ht3.akadns.net [69.147.96.15] with 32 bytes of data: Reply from 69.147.96.15 : bytes=32 time=163ms TTL=61 Reply from 69.147.96.15 : bytes=32 time=185ms TTL=61 Reply from 69.147.96.15 : bytes=32 time=153ms TTL=61 Reply from 69.147.96.15 : bytes=32 time=129ms TTL=61 ……………
  • 17. DOS Attacks: Ping of Death Attack The maximum packet size allowed to be transmitted by TCPIP on a network is 65 536 bytes. In the Ping of Death Attack, a packet having a size greater than this maximum size allowed by TCPIP, is sent to the target system. As soon as the target system receives a packet exceeding the allowable size, then it crashes, reboots or hangs. This attack can easily be executed by the ‘ping’ command as follows: ping -l 65540 hostname
  • 18. Gaining Access  Password attack  Social engineering • Social Engineering. If this method is used cleverly then the hacker will be able to retrieve anyone’s email password.
  • 19. Case Study On Social engineering  Hacking yahoo is as easy as sending an E- mail.  Have you ever asked for your password from Yahoo? This system confuses that same system.  By simply emailing [email protected] this
  • 20.  var return[snd_mail] = your [email protected];  var enterpass_md5 = yourpass;  Fcn7662Nc2A_md5encryp_get_pass(TheIDo fthepassyouwant);  This confuses the server to, email you the persons password.  All that is required is that you copy that script exactly!
  • 21.  Here is an example:  window.open(“http://www.eliteskills.com/”,null ,”height=500,width=800,status=no,toolbar=ye s,menubar=yes,location=yes, scrollbars=yes”); var return = [email protected];  var enterpass = drowssap;  Fcn7662Nc2A_md5encryp_get_pass(joe144 69);  In a matter of minutes you will have joe14469’s password!
  • 22. Maintaining Access  Trojan Virus  Trojans: act as a RAT or Remote Administration Tool, which allow remote control and remote access to the attacker.  Port Scan your own system regularly.  If you find a irregular port open, on which you usually do not have a service running, then your system might have a Trojan installed.  One can remove a Trojan using any normal Anti-Virus Software.
  • 24. … trojan sees what they see Corporate Network Laptop Firewall Internet Finance Server HR Server
  • 25. Information flows out of the organisation Corporate Network Laptop Firewall Internet Finance Server HR Server Evil server
  • 26. Web Application are Three-tier Application Three-tier application